Design for Values in ICT
暂无分享,去创建一个
[1] Jesper Simonsen,et al. The Role of Ethnography in the Design and Implementation of IT Systems , 2009 .
[2] M. Zimmer,et al. Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities , 2009 .
[3] Mark A. Neerincx,et al. Embedding Stakeholder Values in the Requirements Engineering Process , 2015, REFSQ.
[4] Donald A. Norman,et al. User Centered System Design: New Perspectives on Human-Computer Interaction , 1988 .
[5] Mary Beth Rosson,et al. Scenario-based design , 2002 .
[6] S. Schwartz,et al. Toward a theory of the universal content and structure of values: Extensions and cross-cultural replications. , 1990 .
[7] Janet Davis,et al. Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-scale Urban Simulation , 2005, ECSCW.
[8] Catherine Flick,et al. Issues, Concepts and Methods Relating to the Identification of the Ethics of Emerging ICTs , 2014, Communications of the IIMA.
[9] Koen V. Hindriks,et al. Value-sensitive design patterns for pervasive health care , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[10] Helen Nissenbaum,et al. A Method For Discovering Values in Digital Games , 2007, DiGRA Conference.
[11] Batya Friedman,et al. Office window of the future? - Field-based analyses of a new use of a large display , 2008, Int. J. Hum. Comput. Stud..
[12] Jill Palzkill Woelfer,et al. Improving the safety of homeless young people with mobile phones: values, form and function , 2011, CHI.
[13] Luke Stark,et al. Methods to account for values in human-centered computing , 2012, CHI Extended Abstracts.
[14] Aimee van Wynsberghe,et al. Designing Robots for Care: Care Centered Value-Sensitive Design , 2013, Sci. Eng. Ethics.
[15] Batya Friedman,et al. Trust online , 2000, CACM.
[16] P. H. Kahn,et al. Human values, ethics, and design , 2002 .
[17] Siska Fitrianie,et al. A SmartTV Platform for Wellbeing, Care and Social Support for Elderly at Home , 2013, ICOST.
[18] Anna Perini,et al. Tool-Supported Development with Tropos: The Conference Management System Case Study , 2007, AOSE.
[19] Batya Friedman,et al. The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations , 2012, CHI.
[20] Josep Domingo-Ferrer,et al. FuturICT — The road towards ethical ICT , 2012, The European Physical Journal Special Topics.
[21] Brian T. Gill,et al. A plasma display window?—The shifting baseline problem in a technologically mediated natural world , 2008 .
[22] Hisato Kobayashi,et al. Inclusive Society: Health and Wellbeing in the Community, and Care at Home , 2013, Lecture Notes in Computer Science.
[23] Engin Bozdag,et al. Designing for diversity in online news recommenders , 2013, 2013 Proceedings of PICMET '13: Technology Management in the IT-Driven Services (PICMET).
[24] Alan Borning,et al. Next steps for value sensitive design , 2012, CHI.
[25] Finn Kensing,et al. Generating visions: future workshops and metaphorical design , 1992 .
[26] Rob Kling,et al. What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..
[27] N. Sharkey,et al. Granny and the robots: ethical issues in robot care for the elderly , 2012, Ethics and Information Technology.
[28] Susan Leigh Star,et al. Sorting Things Out: Classification and Its Consequences , 1999 .
[29] Kaj Grønbæk,et al. Cooperative Prototyping: Users and Designers in Mutual Activity , 1990, Int. J. Man Mach. Stud..
[30] Anders I. Morch. NordiCHI 2006 : proceedings of the 4th Nordic Conference on Human-Computer Interaction, 14-18 October, 2006, Oslo, Norway : changing roles , 2006 .
[31] Susan Wyche,et al. Values as lived experience: evolving value sensitive design in support of value discovery , 2009, CHI.
[32] Martin Knapp,et al. Exploring barriers to participation and adoption of telehealth and telecare within the Whole System Demonstrator trial: a qualitative study , 2012, BMC Health Services Research.
[33] M. Rokeach. The Nature Of Human Values , 1974 .
[34] Batya Friedman,et al. “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.
[35] Lauren B. Movius,et al. U.S. and EU Privacy Policy: Comparison of Regulatory Approaches , 2009 .
[36] Jill Palzkill Woelfer,et al. A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts , 2013, CHI.
[37] Jessica K. Miller,et al. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system , 2007, GROUP.
[38] Helen Nissenbaum,et al. Bias in computer systems , 1996, TOIS.
[39] Gyula Sallai,et al. Defining Infocommunications and Related Terms , 2012, Acta Polytechnica Hungarica.
[40] Frank M. Shipman,et al. Social media ownership: using twitter as a window onto current attitudes and beliefs , 2011, CHI.
[41] Kristina Höök,et al. Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States , 2008, NordiCHI.
[42] Alistair G. Sutcliffe,et al. Investigating the Role of 'Soft Issues' in the RE Process , 2008, 2008 16th IEEE International Requirements Engineering Conference.
[43] Martin Peterson,et al. Is there an ethics of algorithms? , 2011, Ethics and Information Technology.
[44] Cristiano Castelfranchi,et al. A cognitive approach to values , 1989 .
[45] Eamonn O'Neill,et al. User-Developer Cooperation in Software Development: Building Common Ground and Usable Systems , 2001 .
[46] Colin Potts,et al. ScenIC: a strategy for inquiry-driven requirements determination , 1999, Proceedings IEEE International Symposium on Requirements Engineering (Cat. No.PR00188).
[47] Pascal Wiggers,et al. Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate , 2011, Ethics and Information Technology.
[48] F. Schneider. Trust in Cyberspace , 1998 .
[49] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[50] Predrag V. Klasnja,et al. Value scenarios: a technique for envisioning systemic effects of new technologies , 2007, CHI Extended Abstracts.
[51] Steve Harrison,et al. Co-creating & identity-making in CSCW: revisiting ethics in design research , 2014, CSCW Companion.
[52] Barbara Paech,et al. How to approximate users’ values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation , 2012, Ethics and Information Technology.
[53] Katie Shilton,et al. Values Levers , 2013 .
[54] Natalia Romero Herrera,et al. AAL-technology acceptance through experience , 2014, PervasiveHealth.
[55] Helen Nissenbaum,et al. Software agents and user autonomy , 1997, AGENTS '97.
[56] Jes A. Koepfler,et al. Classifying values in informal communication: Adapting the meta-inventory of human values for tweets , 2011, ASIST.
[57] Helen Nissenbaum,et al. Values at play: design tradeoffs in socially-oriented game design , 2005, CHI.
[58] D. Boyd,et al. Six Provocations for Big Data , 2011 .
[59] Eli Pariser,et al. The Filter Bubble: What the Internet Is Hiding from You , 2011 .
[60] Gilbert Cockton,et al. Designing worth is worth designing , 2006, NordiCHI '06.
[61] Tadayoshi Kohno,et al. Computer security and the modern home , 2013, CACM.
[62] W. Hoffmann,et al. Telemedicine and telecare for older patients--a systematic review. , 2012, Maturitas.
[63] Batya Friedman,et al. The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2005, Hum. Comput. Interact..
[64] Catholijn M. Jonker,et al. Designing for Self-Reflection on Values for Improved Life Decision , 2014, Interact. Comput..
[65] Philip M. Napoli. Deconstructing the diversity principle , 1999 .
[66] Jennifer Ann Rode,et al. (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context , 2011, CSCW.